# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f8a374dfe75255562db46aed11f5b2185046a9ca385fad747933ab07f7847945
Pseudo Output
bc520436afee84522d536a3dd0e2863cfd2231da641a0709bba2934f98567232
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
344f593639be723b5a8bfa1d87301b389092aaed8d71b20f1eb7c31c00021643
Commitment
d446dc9bf1a0f213b4a92439b1aa4148d225492e95bc2d6b293a60a06e6bee55
Range Proof
672 bytes (Bulletproof)
Memo
66baca7e0ea27367640d2facf0217169ba65228079b36a02472c3975b3ebb3466cc34053a530b0cb7547bf1537f301adff8bd7d03d8d99c9c244923a9f3556b5ae98ec324c469cc517518aa5bbc021ee2fa2ce23a8f127584faaaaa3bc56b2643cbcf71eafa919c8faa949c9ef7b02f9cfcb1d2c8a0db9675b181fb5a19622bc (encrypted)
Stealth Address
62727ee753afa020ce4b93fc11c2889f1e04cad8e54dcbb59f2bd50f6d3d6c6c
Commitment
541a7cd940982fbfa4066838c95087b2a543b998306768f03e8fa6433e6a680d
Range Proof
672 bytes (Bulletproof)
Memo
764e559f312b9e1eabd81796c9e3a42127ab68fd7ddac057bd41459747cbfad132743c778df3f46171e527ac140777c4d69d2e338373aa99f3edd3e1b7aa2504e5391bd8c46bbe64da224f119343710469c1ca13b4e5c1ac64f96482d0a4f1d4d9bbd2f000905d50aa20c084ee097524b5e09e32c1b585fa6816049391b3e55c (encrypted)
Stealth Address
8c6c7532ddfa9214353ef6c05f8bf1dd77c69225d1d22c30b5bab2d4ac226b33
Commitment
76c385c93584ffe98672b72e95e17788a2a7cdadcca5b524bbaf738506023b46
Range Proof
672 bytes (Bulletproof)
Memo
1049f4c6a3e63c32d3e27fdf288f881090b22029f4e19ecca89c38f5d2ea709310092e259e93418d0cd05a074e79eb66aa43acd6c845ee153490faa503d453392985e7a80c71a559febf5b975dc35d188e966ced06b2bdf78a766c3822ff3c957da90415e18860703668ca58f56e7816ed1e89b0757abd752a5146b932d484dc (encrypted)